A Constant Factor Distributed Algorithm for Computing Connected Dominating Sets in Wireless Sensor Networks

Similar documents
Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks

An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks

Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks

Chapter 8 DOMINATING SETS

Chapter 8 DOMINATING SETS

Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks

Connected Dominating Sets in Wireless Networks with Different Transmission Ranges

Algorithms for minimum m-connected k-tuple dominating set problem

Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks

Polynomial-Time Approximation Scheme for Minimum Connected Dominating Set in Ad Hoc Wireless Networks. Technical Report

Strongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links

Chapter 6 DOMINATING SETS

Algorithms for Minimum m-connected k-dominating Set Problem

Agreedy approximation for minimum connected dominating sets

Minimum connected dominating sets and maximal independent sets in unit disk graphs

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

A DISTRIBUTED TOPOLOGY CONTROL ALGORITHM FOR MANETS

Randomized Algorithms for Approximating a Connected Dominating Set in Wireless Sensor Networks

Connected Dominating Set in Sensor Networks and MANETs

On minimum m-connected k-dominating set problem in unit disc graphs

On connected domination in unit ball graphs

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks

Constructing weakly connected dominating set for secure clustering in distributed sensor network

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication

An efficient implementation of the greedy forwarding strategy

IN WIRELESS SENSOR NETWORKS

Weakly-Connected Dominating Sets and Sparse Spanners in Wireless Ad Hoc Networks

Distributed approximation algorithms in unit-disk graphs

On Reducing Broadcast Redundancy in Ad Hoc Wireless Networks

Performance of New Broadcast Forwarding Criteria in MANET

Distributed Construction of Connected Dominating Sets Optimized by Minimum-Weight Spanning Tree in Wireless Ad-hoc Sensor Networks

Distributed Algorithms for Coloring and Domination in Wireless Ad Hoc Networks

Estimating the Free Region of a Sensor Node

EFFICIENT DISTRIBUTED ALGORITHMS FOR TOPOLOGY CONTROL PROBLEM WITH SHORTEST PATH CONSTRAINTS

Broadcasting and topology control in wireless ad hoc networks

An Optimal Bound for the MST Algorithm to Compute Energy Efficient Broadcast Trees in Wireless Networks. Qassem Abu Ahmad February 10, 2008

An Eternal Domination Problem in Grids

An Optimal Algorithm for the Euclidean Bottleneck Full Steiner Tree Problem

Thomas Moscibroda Roger Wattenhofer MASS Efficient Computation of Maximal Independent Sets in Unstructured Multi-Hop Radio Networks

Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point

An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks

Anonymous Self-Stabilizing Distributed Algorithms for Connected Dominating Set in a Network Graph

Connected Dominating Set Construction Algorithm for Wireless Networks Based on Connected Subset

The Full Survey on The Euclidean Steiner Tree Problem

Max-Cut and Max-Bisection are NP-hard on unit disk graphs

Linear Kernel for Planar Connected Dominating Set

Distributed Data Aggregation Scheduling in Wireless Sensor Networks

Bottleneck Steiner Tree with Bounded Number of Steiner Vertices

The Dominating Set Problem: (a few) variants and results

A3: A Topology Construction Algorithm for Wireless Sensor Networks

A Reduction of Conway s Thrackle Conjecture

Geometric Unique Set Cover on Unit Disks and Unit Squares

A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks

The Encoding Complexity of Network Coding

Network monitoring: detecting node failures

A 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition

Max-Cut and Max-Bisection are NP-hard on unit disk graphs

ANALYZE AND EVALUATE THE IMPLEMENTATION OF CDS ALGORITHMS USING THE MOBILE AGENT.. 1 RAFAT AHMED ALHANANI, 2 JAAFAR ABOUCHABAKA, 3 RAFALIA NAJAT

Maximal Independent Set

Algorithm and Complexity of Disjointed Connected Dominating Set Problem on Trees

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas

Incremental Construction of k-dominating Sets in Wireless Sensor Networks

Vertex 3-colorability of claw-free graphs

Efficient Self Protection Algorithms for Wireless Sensor Networks

Polynomial Time Approximation Schemes for the Euclidean Traveling Salesman Problem

Learning Automata Based Algorithms for Finding Minimum Weakly Connected Dominating Set in Stochastic Graphs

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks

Fast algorithms for max independent set

Distributed minimum spanning tree problem

Low Power Hitch-hiking Broadcast in Ad Hoc Wireless Networks

Approximation Algorithms for Geometric Intersection Graphs

Theorem 2.9: nearest addition algorithm

Discrete Applied Mathematics. A revision and extension of results on 4-regular, 4-connected, claw-free graphs

Total dominating set based algorithm for connected dominating set in Ad hoc wireless networks

Ad hoc and Sensor Networks Topology control

Two Characterizations of Hypercubes

Maximal Independent Set

Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks

Efficient Directional Network Backbone Construction in Mobile Ad Hoc Networks

COORDINATED ENERGY CONSERVATION IN AD HOC NETWORKS

Algorithms for A Connected Dominating Set in Wireless Networks

Solving Dominating Set in Larger Classes of Graphs: FPT Algorithms and Polynomial Kernels

Maximizing System Lifetime in Wireless Sensor Networks

Improved Algorithms for the Connected Sensor Cover Problem

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

A tight bound for online colouring of disk graphs

1 The Traveling Salesperson Problem (TSP)

Strongly Connected Spanning Subgraph for Almost Symmetric Networks

AN AD HOC network consists of a collection of mobile

A Routing Algorithm via Constructing the Weighted Minimum Connected Dominating Set in Mobile Adhoc

An Extended Localized Algorithm for Connected Dominating Set Formation in Ad Hoc Wireless Networks

Packing Two Disks into a Polygonal Environment

Treewidth and graph minors

COMP Analysis of Algorithms & Data Structures

Module 6 NP-Complete Problems and Heuristics

Transcription:

A Constant Factor Distributed Algorithm for Computing Connected Dominating Sets in Wireless Sensor Networks Kamrul Islam, Selim G Akl, and Henk Meijer School of Computing, Queen s University Kingston, Ontario, Canada K7L 3N6 {islam,akl,henk}@cs.queensu.ca Abstract Connected dominating sets (CDSs) are probably the most common way of constructing virtual backbones for broadcasting operation in wireless sensor networks. This is because such backbones guarantee to reduce unnecessary message transmissions or flooding in the network. In this paper we propose a simple distributed algorithm to construct a small-sized CDS. Considering the sensors deployed in the plane, our main idea is based on the computation of convex hulls of sensor nodes (nodes are considered points in the plane) in a distributed manner and a simple coloring scheme, which produces a CDS in unit disk graphs whose size is at most 50.54 MCDS, where MCDS is the size of a minimum CDS. To the best of our knowledge, this is a significant improvement over the best published results in the same context [5]. We also analyze grids and trees to compute the approximation ratios for the problem. We show that our algorithm produces an optimal CDS if the graph is a tree and in the case of grids the approximation factor is 2.. Introduction A wireless sensor network is composed of a set of battery-powered sensors which communicate with one another over wireless links directly if they are within their transmission ranges, otherwise they rely on other sensors to establish a connection between them. The wireless and self-configurable capability of sensors networks make them well-suited for several scenarios, such as battle-fields, target tracking, and most scenarios that involve monitoring an environment. However, the lack of a communication infrastructure presents several challenging and interesting research issues in the design of communication protocols for sensor networks. Establishing a virtual backbone in wireless networks, which can be seen as an analogue of the fixed communication infrastructure in wired networks, helps reduce interference, and hence the number of retransmissions for the energy-constrained sensors. This is because only a fixed and small number of sensors are engaged in transmissions. A virtual backbone typically consists of a subset of nodes in the network which are responsible for receiving and transmitting messages throughout the network. The connected dominating set is one of the earliest structures proposed as a candidate for a virtual backbone in wireless networks [0]. Given a graph G = (V, E) where V and E are sets of nodes and edges respectively, a subset D of V is a dominating set if each node u V is in D or is adjacent to some node v D. A subset K of V is a connected dominating set if K is a dominating set and induces a connected subgraph. A connected dominating set with minimum cardinality is called a minimum connected dominating set (MCDS). A subset of V is an independent set if, for any pair of nodes in the subset, there is no edge between them. An independent set is a maximal independent set (MIS) if no more nodes can be added to the independent set to generate a larger independent set. An MIS is a dominating set. In the context of sensor networks, a well studied problem is that of finding an MCDS in a unit disk graph (UDG). UDGs are a class of graphs which are often used to model connectivity in sensor networks where an edge between two nodes exists if and only if their Euclidean distance is at most one. In this paper, we consider G to be a UDG to model the sensor network and devise a distributed algorithm for the connected dominating set problem. One of the popular approaches to compute a small-

sized CDS in sensor networks modeled as a UDG, is to find an MIS (or assume that an MIS is given) in the network graph and then select a set of nodes called connectors to connect the nodes in the MIS. The main difficulty of achieving a small approximation factor lies in the selection of connectors because there is a constant bound of the size of MIS in UDG in terms of the size of an MCDS. In general, the smaller the number of connectors, the better (smaller) the approximation ratio. So clever strategies are sought to connect nodes in MIS. There exist several distributed and centralized algorithms to bound the number of the connectors. The readers are referred to the most recent survey in [4] to know about these techniques. Our proposed algorithm is slightly different from the usual approach. Instead of finding an MIS in the whole network, our approach first builds a small connected subgraph of the network graph based on the computation of convex-hulls of the -hop neighborhood of individual sensors, then finds an MIS in the subgraph and finally connects the nodes in the MIS through other nodes. We also provide an analysis of the relationship between the sizes of an MIS and an MCDS. The rest of the paper is organized as follows. In Section 3 we provide definitions and assumptions that are used throughout the paper. The distributed algorithm is presented in Section 4. We provide an analysis of the size of an MIS and the size of an MCDS and present the main result of the approximation factor for the size of the computed CDS in Section 5. This section also contains specific results when the underlying unit disk graph is a tree and a grid. Time and message complexities of the algorithm are presented Section 6. We conclude in Section 7. 2. Related Work Guha and Khuller [2] studied the MCDS problem and showed that this problem is NP-hard in arbitrary undirected graphs. They present a centralized approximation algorithm which guarantees a O(log n) approximation factor where n is the number of nodes in the graph. Later it was shown in [8] that computing an MCDS is NP-hard even for UDGs. The first centralized method towards solving this problem achieves a 0-approximation factor and was given by Marathe [4]. Cheng et. al [7] presented a polynomial-time approximation scheme that guarantees an approximation factor of ( + /s) with running time of n O((s log s)2). However, in reality, centralized algorithms can not be effectively applied in large sensor networks because of huge power consumption. Therefore, distributed algorithms are sought to find an approximate MCDS in such networks. Several distributed approximation algorithms exist in the literature, some of the earlier attempts include the algorithms of Stojmenovic and Xiang-Li [7, 9] which distributedly construct a CDS of size n/2 times that of an MCDS. Alzoubi et al. [3] proposed the first distributed algorithm guaranteeing a constant approximation factor for CDS construction based on MIS in UDGs. The main features of their distributed algorithm include an approximation factor of 8, O(n) time complexity, and O(n log n) message complexity. One of the important results established in that paper, is that Ω(n log n) a lower bound on the message complexity of any distributed algorithm for nontrivial CDSs. However, the algorithm in [3] suffers from the construction of a spanning tree in wireless networks, which is expensive since the time complexity is Diam(G) in which case a node needs to know the whole topology of the network. Building a spanning tree and maintaining a CDS in large and volatile WSNs with common node and link failures incur a significant number of retransmissions and communication overhead. Later, Alzoubi et al. came up with a constant factor distributed algorithm [] that does not rely on the construction of spanning trees. However, the algorithm produces a CDS with size at most 92 MCDS + 48. Lately, Funke et al. [] gave a distributed algorithm which provides an approximation factor of 6.9 and outperforms all other approximation factors of previous distributed algorithms. Although the factor is small, the time complexity of their algorithm is still Diam(G), which is O(n) in the worst-case. In an attempt to obtain a small constant factor, a distributed algorithm is proposed in [3] which produces a CDS with size at most 72 MCDS + 33 in UDGs. Subsequently, the next level of reduction in the constant factor was achieved by the distributed algorithm in [6], where the factor is 47 (specifically, 47 MCDS + 43). Recently D. Chen et al. managed to achieve even a smaller constant factor by a simple distributed algorithm. The cardinality of the CDS produced by their algorithm is at most 76 MCDS + 9. Here, we present a technique that reduces this constant factor to 50.54, that is, it produces a CDS with size

at most 50.54 MCDS. We analyze special classes of graphs, for example, trees and grids, where the approximation ratios obtained by our algorithm are (optimal) and 2, respectively. 3. Model and Definitions We assume that sensor nodes are deployed in the plane and the network of nodes is modeled by an undirected graph G = (V, E), where link (u, v) E between two sensor nodes u, v V exists if they are within their transmission range. Every sensor node u V has the same transmission range which is normalized to one. Neighbor sets N(u) and N[u] of sensor node u are defined as N(u) = {v (u, v) E, u v} and N[u] = N(u) {u}. We use a computational geometry idea called the convex hull in our algorithm. The convex hull of a set of points in the plane is defined as the smallest convex polygon that includes all the points in the set such that each point is either a corner of the convex hull or lies inside it. The convex hull of N(u) is denoted by CH(N(u)). We say CH(P ) of some point set P V is completely included (or just included) in CH(Q) of point set Q V if CH(P ) CH(Q). Each sensor node u has a unique integer id, denoted by id(u). We assume a synchronized message passing system as in [5] in which time is divided into equal rounds. In each communication round a node of the network graph is capable of receiving messages from its neighbors, performing local computations, and broadcasting a message to its neighbors. The time complexity of an algorithm is the number of rounds it needs to produce the desired result. Although we use a synchronous system, it is well known that a synchronous message passing algorithm can be turned into an asynchronous algorithm with the same time complexity, but with a larger message complexity [5]. Sensor nodes know their geographic locations and obtain their neighbors locations through exchanging Hello messages. 4. A Distributed Algorithm for CDS From now on instead of using sensor nodes we use only nodes. In this section we present a simple algorithm for computing a CDS in G based on the computation of convex-hulls of the -hop neighborhood of individual nodes and a coloring scheme of the nodes of G. There are three colors, namely black, grey and white. Initially all nodes are white. Here we outline the algorithm (call our algorithm A): The algorithm consists of two phases (Phase I and Phase II). In Phase I, we distributedly form a primary CDS denoted by B, which is pruned in the next phase (II) to generate the final CDS denoted by CDS (CDS is the solution we are looking for). After the execution of Phase I, all nodes change their respective colors and become either black (if the node belongs to B) or grey (otherwise). In Phase II, first we prune the set B of black nodes. In order to do so, we apply a distributed MIS algorithm in B. Let the set of MIS nodes returned by the algorithm be S B. Although an MIS is a dominating set in a graph, the subset S is not a dominating set in G since S is obtained from the nodes in B (not from the nodes V ). Then we form a dominating set in G consisting of nodes in S and a set B of additional nodes (B (V \ S)). Thereafter, a set C of connectors is selected from V \ S to connect the nodes in S such that S B C forms the desired CDS. Following is a detailed description of the two phases of algorithm A: Phase I (Coloring nodes): Initially all nodes are white. Each node u locally computes the convex hull CH(N[u]) following an optimal convex hull algorithm [9]. Then u compares CH(N[u]) with CH(N[v]) for all v N(u) and colors itself in the following way: () If there is no v such that CH(N[u]) CH(N[v]) Then u colors itself black. (2) If there is some v such that CH(N[u]) CH(N[v]) Then u colors itself grey. (3) If there are some v s such that CH(N[u]) = CH(N[v]) Then node u colors itself black If it has the smallest id among all such v s, otherwise it colors itself grey. This phase colors every white node either black or grey. We show that that set of black nodes B forms a CDS in G (Lemma 5.). In Figure, we give a simple example where the black nodes by Phase I of the algorithm A form a CDS. Node 4 colors itself black since its convex hull

CH(N[4]) = {, 2, 3, 5} (shown in dashed line segments) is not included in any of the convex hulls CH(N[]), CH(N[2]), CH(N[3]) or CH(N[5]). For the same reason, nodes 5 and 6 color themselves black. However, nodes, 2, 3, 7, 8, and 9 are colored grey because each of their computed convex hulls is included in its corresponding neighbor s convex hull. 4 2 3 9 5 6 Figure. Node 4 is black since CH(N[4]) = {, 2, 3, 5} (shown in dashed line segments) is not included in any of CH(N[]), CH(N[2]), CH(N[3]) or CH(N[5]). The same applies to nodes 5 and 6. 7 8 B(u) to dominate itself. If B(u) >, then u selects the one with the minimum id. The set of black nodes selected by all such grey nodes constitutes the set B. Observe that S B is now a dominating set in G because all the orphan nodes have at least one neighbor in B. Change the color of the nodes in B \ (S B ) into grey. Although S B dominates the nodes in G, it is not necessarily connected. Therefore, a set of connectors C from V \ S is sought to connect the MIS nodes S in order to find a CDS in G. A node u S connects to a node v S, u v with the minimum id, which is at most 3 hops away. Therefore, at most two intermediate nodes between u and v are selected to be in C. All such selected intermediate nodes form the connector set C. The nodes in C color themselves black. Finally, the union S B C forms the CDS in G. For an illustration, we provide a complete example of Phase I and Phase II of algorithm A is given in Figure 2: 2 3 4 5 2 3 4 5 Phase II (Finding an MIS S and a set C of connectors): This phase begins when Phase I is finished, that is, when there are no white nodes in G. In this phase, first, as mentioned before an MIS S is constructed from the set of black nodes B by following the distributed algorithm [6]. The authors in [6] present a very fast O(log n) distributed algorithm for computing such an MIS for any growth bounded graph, where the growth boundedness of a graph means that in a constant neighborhood of any node there is a constant number of independent nodes. (It can be mentioned that a UDG is a growth bounded graph since for any node u the number of independent nodes in its r-neighborhood, N r (u), is O(r 2 ).) As S is not a dominating set in G, some grey nodes in G may not be dominated (covered) by S. Note that according to the algorithm, for each grey node u there must be at least a black neighbor v N(u) B such that CH(u) CH(v), otherwise u would not be grey. Let B(u) denote the set of such black neighbors of u. Now we find an additional set B of nodes from V \S in the following way to make S B a dominating set in G. Call the grey nodes not dominated by S orphan nodes. An orphan node u selects a black node from 2 3 6 7 8 9 0 (a) 2 3 2 3 2 3 4 5 6 7 8 9 0 (c) 6 7 8 9 0 (b) Figure 2. (a) After Phase I, B = {, 2, 3, 4, 5, 6, 7, 8, 9, 0}. (b) S consists of nodes {4, 0}. Additional node set is B = {, 6}. (c) After Phase II the solution is S C B = {, 4, 5, 6, 0}, where C = {5}. The MCDS consists of {, 6}. The proposed distributed algorithm is given in Figure 3 which is executed at each node u.

Distributed Algorithm for CDS PHASE I: : If v N(u) such that CH(N[u]) CH(N[v]) Then 2: Color u grey Endif 3: If v N(u) such that CH(N[u]) CH(N[v]) Then 4: Color u black Endif 5: If v N(u) such that CH(N[u]) = CH(N[v]) Then 6: If id(u) < id(v), v N(u) Then 7: Color u black 8: Else 9: Color u grey 0: Endif Endif PHASE II: : If u is black Then Run MIS [6] Endif 2: If u is grey Then Select a node in B(u) Endif 3: If u is in S Then Select connectors between u and v Endif // v S is at most 3 hops away and id(u) > id(v) Figure 3. A Distributed algorithm for the CDS problem. 5. Theoretical Analysis As mentioned before, the first phase of the algorithm is finished when each node is either black or grey. Here we provide a lemma which is essential for the proofs of other results. This lemma guarantees that the set of black nodes B found through Phase I is a CDS. Lemma 5. The set B forms a CDS in G. Proof We prove the lemma by contradiction. Suppose u is grey. Then from the algorithm (consider Phase I only) we derive either Case : CH(N[u]) CH(N[v]) for some v N[u]) or Case 2: if such v does not exist, there are some nodes v with CH(N[u]) = CH(N[v]) and there is a v with id(v) < id(u). In Case, if there are several such nodes with this property, take a node v with the maximal size (in terms of the number of vertices) CH(N[v]) (using the partial order subset of or equal ). If there is still a tie, take the one with the minimum id. Node v cannot be colored grey at the beginning of the algorithm since this would mean the presence of a node w, where w N(u) and CH(N[u]) CH(N[v]) CH(N[w]) implying that CH(N[v]) is not maximal. Also it can not be colored grey in the next step since that implies that there is a node w with CH(N[u]) CH(N[v]) = CH(N[w]) and id(w) < id(v), so v does not have the minimum id. Therefore, v is colored black. Of all such nodes (v) with the property of Case 2, take the one with the minimum id. Node v is not colored grey at the beginning of the algorithm, since this would imply the presence of a node w with CH(N[u]) = CH(N[v]) CH(N[w]) and w N(v). However, it will be colored black in the next step but this is a contradiction. So B is a dominating set. In order to prove that the node set B is connected, we show that there is a path between any two nodes u, v B containing only black nodes. For the sake of contradiction assume such a path, π = (u,, v i, v i, v i+,, v) contains a grey node v i / B. Here the node that precedes v i is labeled as v i and the one that follows v i is labeled as v i+ on the path. Node v i is colored grey since it has some neighbor v t N(v i ) (v i is not an isolated node and has at least one neighbor) such that CH(N[v i ]) CH(N[v t ]), where either id(v t ) < id(v i ) and CH(N[v i ]) = CH(N[v t ]) or CH(N[v i ]) CH(N[v t ]). If that is the case then v t s neighborhood must include all of v i s neighbors, that is, v i, v i+ N(v t ). Thus instead of taking v i in π, we can include black node v t in π. If there are other grey nodes in the path π, then we can apply the same argument for all such grey nodes in the path. So the path π = (u,, v i, v t, v i+,, v) contains only black nodes which is a contradiction to the original assumption that π contains some grey node. Since B is connected, we can apply the distributed MIS algorithm [6] to B which takes O(log B ) time to compute an MIS S in B. We will prove that the cardinality of the union of S and a set of additional nodes, B (i.e., S B ) is at most 2.66 times the size of an MCDS of G. Before that we need the following lemma: Lemma 5.2 S.66 MCDS + 2 Proof Consider a node u in the MCDS and its 2-hop neighborhood N 2 [u] such that for any node v N 2 [u] we have N[v] N 2 [u] (see Figure 4). In other words, v s -hop neighborhood is contained in N 2 [u].

Node u can have at most 5 MIS nodes, labeled u i, i 5 as shown, in its -hop neighborhood. A node v N 2 [u] in the 2-hop neighborhood can be colored black if v is adjacent to both u i and u i+ (assume modulo arithmetic). This is because v s convex hull CH(N[v]) will not be included in any of its neighbors convex hulls. Similarly, any node v which is 2-hop away from u and not adjacent to both u i and u i+ will not be colored black since CH(N[v ]) must be included in the convex hull CH(N[u ]) of some node u N[u]. u 3 u 4 v u u 2 v >60 deg. u 5 u u 3 u 4 v u u 2 u 5 u According to the above arrangement of the nodes we can have at most black nodes in N 2 [u]. As we apply an MIS algorithm, we can have at most six MIS nodes in N 2 [u] (the MIS nodes are labeled in the figure). u (a) Case (b) Case 2 Now we determine the minimum number of MCDS nodes that u must have in N[u] in order to cover all the MIS nodes in N 2 [u]. In order to do that we need to investigate the following four cases: Case : At least four MCDS nodes, namely, u, u i, u i+2 and u i+3 are required to cover (dominate) at most six MIS nodes (Figure 4(a)). Case 2: At least three MCDS nodes (u, u i, u i+2 ) are required to cover at most five MIS nodes (Figure 4(b)). u 2 u 3 u u (c) Case 3 (d) Case 4 Figure 4. Proof of Lemma 5.2. Case 3: At least two MCDS nodes (u, u i ) are required to cover at most three MIS nodes (Figure 4(c)). Case 4: At least one MCDS node (u) is required to cover one MIS node (Figure 4(d)). Analyzing the above relations we have the following: Thus S 5 MCDS 3.66 MCDS +.66 MCDS + 2. This completes our proof. Theorem 5.3 Let B be a CDS in G and S be any MIS in B. If B denotes the set of additional nodes, then S B 2.66 MCDS + 2. Proof Recall that for any orphan node u (u is grey) there must be at least a black node v N(u) such that CH(N(u)) CH(N(v)), otherwise u would not be grey. In order for the MCDS to cover u, either u must belong to an MCDS or there will be at least a node v MCDS N(u). In any case an MCDS must have at least one node from N[u]. Since u selects the node with the minimum id from N(u), the number of nodes in MCDS will not be greater than the number of nodes selected by all orphan nodes in the graph. Therefore, B MCDS, where B is the set of nodes selected by all orphan nodes in the graph. Therefore, combining the results from Lemma 5.2 we obtain the following, S B 2.66 MCDS +2. Now we have S B black nodes in G and all other nodes are dominated by them. Recall that B \ (S B ) are colored grey. As S B may not be a CDS, we find a set C of connectors to connect the nodes in S so that S B C becomes the desired CDS. In order to build the set C of connectors we adopt the following strategy: Initially, the set C is empty. Each node b S finds shortest-distance paths to all neighbors b S (b b and id(b) > id(b )) which are two and three hops away from b. If the length of a shortest path between b and b is 2 and they are already connected via an intermediate node in B, then b does not choose any connector, else a connector is chosen. Ties are broken when there are more than one such connectors by selecting the one which has the smallest id. Similarly

if they are three hops away and already connected by two (or one) nodes in B then no (or one) connectors are sought. Otherwise, they select two connectors. All these connectors color themselves black. C denote the set of all such connectors. In the following lemma, we prove that CDS = S B C in G forms a CDS. Lemma 5.4 The set CDS = S B C forms a CDS in G. Proof We first show that S B C is a dominating set in G and then prove that it is connected. By construction, S B is a dominating set in G and so is S B C. Assume for the sake of contradiction that the subgraph G s induced by the nodes in S B C is not connected. Consider two neighboring non-empty components G s and G s of G s. There are two cases: Case : There is no element of S in one of the components G s and G s. Without loss of generality assume G s is that component. Since G s is non-empty and does not have any element from S, the orphan nodes in G s must have selected some black nodes in B to dominate them, otherwise G s would not be a dominating set. If such a black node u B, G s would not have a neighbor v S, G s, then u must belong to S, a contradiction. Case 2: There is at least one node from S in each component G s and G s. Find two nodes s S, G s and s 2 S, G s such that the distance between them is at most three hops. Without loss of generality, let id(s ) > id(s 2 ). For each node u S the algorithm selects at most two intermediate nodes to all other nodes in v S which are at most 3 hops away and id(u) > id(v). If s and s 2 are not connected by any node in B C then either their distance is more than three or their ids are the same, both cases yield a contradiction. We use the following lemma from [5] which bounds the size of C in G in terms of the cardinality of an MIS. Theorem 5.5 The cardinality of C is at most 8 S [5]. Theorem 5.6 For any maximal independent set S in B, a set B of additional nodes and a set C of connectors in a UDG G = (V, E), we have S B C 50.54 MCDS + 38. Proof Combining the results of Theorems 5.3 and 5.5 we get: Then, C 8 S 8 S B 8 2.66 MCDS + 36 = 47.88 MCDS + 36. S B C S B + C 2.66 MCDS + 2 + 47.88 MCDS + 36 = 50.54 MCDS + 38. One feature of our algorithm A is that it guarantees an MCDS (minimum CDS) for trees. The interesting thing is that we do not need to check whether G is a tree to compute an MCDS. This means that if G is a tree, algorithm A generates the optimal CDS. Other algorithms such as [2] require G to be checked for being a tree in order to construct a CDS. That is, the problem with their algorithm is that the nodes need to construct a spanning tree from the underlying graph which is an expensive operation in terms of energy usage. We prove the optimality result in the following theorem. Theorem 5.7 If the underlying unit disk graph G is a tree with V > 2 algorithm A produces an MCDS. Proof It is well known that for a tree an MCDS consists only of the internal nodes of the tree. We prove the theorem by contradiction. Suppose a CDS produced by algorithm A consists of some leaves of the tree. Let l be such a leaf and p its parent. Since l is in the CDS, its computed convex hull CH(N[l]) is not included in any of its neighbor s convex hull and its color is black. However, its only neighbor is p and p s neighborhood contains at least two neighbors including l, otherwise p is a leaf. Obviously, the convex hull CH(N[l]) is included in CH(N[p]), since N[l] includes only l and p. So l would be colored grey and cannot be in the CDS, which is a contradiction. We analyze the performance of our algorithm in grids where we show that the cardinality of the CDS produced by algorithm A is less than twice the size of an MCDS.

Theorem 5.8 Given a m n grid, where nodes are placed at the intersection points and the Euclidean distance between two adjacent nodes equals, algorithm A produces a CDS such that CDS 2 MCDS. mn mn+m 2 Proof By analyzing the m n grid, the size of the minimum connected dominating set can be calculated as: MCDS = m 2 n + m 2 = mn n+m 3 2, when m is odd and MCDS = m 2 n + m 2 = mn+m 2 2, when m is even. The cardinality of the CDS generated by algorithm A is mn. Thus if m is even the approximation factor is 2 < 2. However, if m is odd and m > n, the approximation factor is mn 2 mn n+m 3 < 2. Corollary 5.9 For any induced subset of an m n grid, algorithm A produces a CDS with at most twice as many nodes as an MCDS. 6. Time and Message Complexities According to our model LOCAL S, the time complexity of algorithm A is derived as follows. Each node u receives the location information of its neighbors and sends its location to them which can be done in a single round. Then u computes the convex hull CH(N[u]) and checks whether the convex hull is included in any of the convex hulls of its neighbors. However, the whole process of computing and comparing CH(N[u]) with CH(N[v]), v N(u), for inclusion is negligible in synchronous systems [5], where the time complexity is measured in terms of number of rounds. After computing CH(N[u]), u sends the list of vertices of CH(N[u]) to all its neighbors and receives theirs as well. Since the message size is arbitrary, the exchange of convex hulls can be done in a single round. The computation of the distributed MIS [6] takes O(log B ) time, where B is the set of black nodes. The distributed MIS algorithm in B generates the set S. Each node in S finds at most two intermediate nodes in S which are at most three hops away from it. However, the number of such neighbors is a constant [8] for a node u S. Thus computing such shortest paths takes O()-time. Therefore, the overall time complexity of the algorithm is O(log B )=O(log n). To compute the message complexity, we see that each node has to send its location, id (all these can be packed in a single message) to its neighbors, which takes O(n) messages to be sent. Again, after computing the convex hull CH(N[u]), node u sends CH(N[u]) (the nodes in the convex hull are put in a message) to its neighbors which also takes O(n) messages to be exchanged in the network. However, to compute an MIS it takes O( E log n) [6] messages. Thus the message complexity of the entire algorithm is O( E log n). 7. Conclusion Computing a CDS distributedly in WSNs is a very well studied problem. However, devising distributed algorithms for constructing such CDSs become more challenging when it is aimed to obtain a small constant approximation factor with each node knowing a limited amount of information about the topology of the underlying network. Several distributed algorithms are known in this context and interestingly almost all of them use the same approach: find an MIS in the network graph and then connect them through other nodes to construct the set. Instead of finding an MIS in the whole network, our approach first builds a connected subgraph in the network graph, then finds an MIS in the subgraph and finally connects the nodes in the MIS through other nodes. By this technique, we could remove a number of unwanted nodes from being in the connected dominating set. This way our simple distributed algorithm guarantees a relatively small constant approximation factor which is a good improvement over the best known constant factor [5]. The main difficulty in lowering the constant factor lies in the reduction of the size of the connectors used to connect the nodes in the MIS. Exploring further geometric properties of unit disk graphs may help achieve a better bound for the size of the set of connector nodes. In future work, we look forward to finding distributed constant factor CDS algorithms in special classes of graphs, such as for example, planar graphs. References [] K. Alzoubi, P.-J. Wan, and O. Frieder. Messageoptimal connected-dominating-set construction for routing in mobile ad hoc networks. In Proc. the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, June 2000. [2] K. Alzoubi, P.-J. Wan, and O. Frieder. Distributed heuristics for connected dominating set in wireless ad hoc networks. IEEE ComSoc/KICS Journal on Communication Networks, 4():22 29, March 2002. [3] K. Alzoubi, P.-J. Wan, and O. Frieder. New distributed algorithm for connected dominating set in wireless ad hoc networks. In Proc. IEEE HICSS35, January 2002. [4] J. Blum, M. Ding, A. Thaeler, and X. Cheng. Connected Dominating Set in Sensor Networks and MANETs, Handbook of Combinatorial Optimization (Editors), pages 329 369. Kluwer Academic Publisher, 2004.

[5] D. Chen, X. Mao, X. Fei, K. Xing, F. Liu, and M. Song. A convex-hull based algorithm to connect the maximal independent set in unit disk graphs. Wireless Algorithms, Systems, and Applications, pages 363 370, 2006. [6] X. Cheng, M. Ding, D. Du, and X. Jia. On the construction of connected dominating set in wireless networks. Wireless communications and Mobile Computing, 6:83 90, 2006. [7] X. Cheng, X. Huang, D. Li, and D. Du. Polynomial-time approximation scheme for minimum connected dominating set in ad hoc wireless networks. Networks, 42(4):202 208, June 2003. [8] B. Clark, C. Colborn, and D. Johnson. Unit disk graphs. Discrete Mathematics, 86:65 77, March 990. [9] T. Cormen, C. Leiserson, R. Rivest, and C. Stein. Introduction to Algorithms. The MIT Press and McGraw- Hill, 200. [0] B. Das and G. Bharghaban. Routing in adhoc networks using minimum connected dominating set. In Proc. IEEE International Conference for Communication, 997. [] S. Funke, A. Kesselman, U. Meyer, and M. Segal. A simple improved distributed algorithm for minimum connected dominating set in unit disk graphs. ACM Transactions on Sensor Networks, 2(3):444 453, August 2006. [2] S. Guha and S. Khuller. Approximation algorithms for connected dominating sets. Algorithmica, pages 374 387, 998. [3] Y. Li, S. Zhu, M. Thai, and D. Du. Localized construction of connected dominating set in wireless networks. In Proc. TAWN, June 2004. [4] M. Marathe, H. Breu, H. Hunt, S. Ravi, and D. Rosenkrantz. Simple heuristics for unit disk graphs. Networks, pages 59 68, 995. [5] D. Peleg. Distributed Computing: A Locality-Sensitive Approach. SIAM, Philadelphia, PA, second edition, 2000. [6] J. Schneider and R. Wattenhofer. A log-star distributed maximal independent set algorithm for growth-bounded graphs. In Proc. PODC, 2008. [7] I. Stojmenovic, M. Seddigh, and J. Zunic. Dominating sets and neighbor elimination based routing algorithms in wireless sensor networks. IEEE Transaction Parallel Distributed Systems, 3():4 25, 2002. [8] P. Wan, K. Alzoubi, and O. Frieder. Distributed construction of connected dominating set in wireless adhoc networks. In Proc. INFOCOM, 2002. [9] J. Wu and H. Li. On calculating connected dominating sets for efficient routing in ad hoc wireless networks. In Proc. Discrete Algorithms and Methods for Mobile Computing, volume 3, pages 7 4, 999.